Fastly Study Shows Large Amount Of Aussie IT Companies Are Operating Under Threat Of Cyber Attack

Fastly Study Shows Large Amount Of Aussie IT Companies Are Operating Under Threat Of Cyber Attack
B&T Magazine
Edited by B&T Magazine



Fastly, Inc., a global edge cloud platform provider, today released new research in partnership with Ecosystm that shows 75 percent of Australian businesses are now living with a vastly increased attack surface caused by their reliance on web-based applications.

Large attack surfaces are routinely sought out and tested by attackers looking for less-protected entry points into corporate IT environments.

According to the survey, organisations in Australia moved en masse to more decentralised IT architectures over the past two years, but still struggle with some of the cybersecurity implications of these kinds of digital- and cloud-first operating models. Cloud, web applications and the APIs that enable these apps to integrate and exchange data rate highly in the risk and challenge assessments by CIOs, IT directors and technology leaders of Australian organisations. API endpoints, cloud service provider authentication, and enterprise open source software are all seen to pose considerable risks as potential entry points for attackers.

Inadequate controls around these architectural elements, coupled with a lack of operational maturity and reliance on traditional defensive postures, has Australian business leaders on edge and fearful of attacks. The survey shows that 65 percent of large enterprises in Australia rate nation state attacks as a very high or high risk to their organisations. There is also concern among leaders of all business sizes over credential stuffing, which attackers may use to try to compromise cloud accounts and individual as-a-service logins.

The research also shows that:

  • IT leaders expect to increase focus on the security of web applications in the next two years, but more likely in 2023. Digital has dominated IT strategies over the past two years, but operating securely in a majority or fully web- or cloud-based environment means living with elevated risk tolerances and discomfort for security teams.
  • Application security often comes off second in the competition for attention and funding. Over half (53 percent) of IT leaders say they’re prioritising “other digital transformation projects” above application security in 2022, while 39 percent say “other business initiatives” – outside of IT – are taking priority, to the detriment of cybersecurity.
  • More than 40 percent of leaders identify cloud misconfiguration as being still among their top five cybersecurity challenges. Despite the attention and focus this issue has received in the past couple of years, and the rise of low-code/no-code platforms and configurations, cloud environments remain complex, and errors or misunderstandings mean even experienced engineers can encounter cost overruns and/or unintended data exposure risks. This is higher for enterprises (41 percent) than for large (22 percent) and medium-sized (26 percent) organisations.
  • The key challenge for managing application security initiatives is complexity. 55 percent of leaders say too many third parties are involved in end-to-end security of their applications, pointing to the new reality of operating in a cloud-, web- and API-driven world.

That is because a typical response by decision-makers to the increasing complexity of their technology environments is to deploy additional new security solutions. But that approach means nearly half of Australian companies have more than 50 cybersecurity tools, and are battling alert fatigue and high false positive rates as a result.

Organisations need a modern cybersecurity posture that enables them to anticipate threats before they happen, and respond instantly when attacks occur. They need security controls that are capable of automatically sensing, detecting, reacting, and responding to access requests, authentication needs, and outside and inside threats. Administration and application of these controls should also be automated to a high degree to improve coverage and consistency, and reduce the burden on Security Operations Centres (SOCs) and cybersecurity practitioners.

“As Australian companies move deeper into digital transformations, they come up against a known problem: the challenges of securing a rapidly rising number of mission-critical cloud services and API-centric applications,” said Derek Rast, area vice president Australia and New Zealand at Fastly. “The tools these companies use to secure their digital-first, cloud-first and microservices-based architectures need to evolve. Traditional web application and API security tools fall short in this regard. Leveraging Web Application Firewalls (WAFs) and Content Delivery Networks (CDNs) should be part of a holistic defense-in-depth security strategy.”

Illustrating perfectly the cyber maturity challenges faced by Australian companies is the lack of consistency in the operating parameters, powers and preparedness of cyber threat and incident response teams.

The research finds one in three cyber threat response teams lacks the support of key internal stakeholders, is unclear about escalation points for incident management, and doesn’t have the authority to confiscate or disconnect equipment and monitor suspicious activity, including from senior management.

In addition, when it comes to cyber threat response planning:

  • Only 54 percent have a full plan that includes legal and corporate communications teams
  • 50 percent rehearse the plan at least once a year, the other half practice less frequently or don’t practice at all
  • 48 percent have a timeframe for additions and improvements for the plan, and hold senior leaders responsible for making the improvements

Enterprises are more likely than large or medium-sized organisations to have a multi-stakeholder plan that is well-rehearsed. However, they’re also more likely to be subjected to regulated requirements for incident planning and response. This is supported in the study by compliance being identified as a major cybersecurity challenge facing organisations.

Medium and large organisations are more likely than enterprises to be rethinking the way they deploy applications and business logic to end users and to be in active pursuit of that target state. The research shows 64 percent of medium-sized organisations and 56 percent of large organisations are embracing edge computing, moving business logic from application servers to an edge cache. By contrast, just 43 percent of enterprises are doing the same – 10 percent below the overall average.

Moving business logic from the backend to the edge not only increases application performance but can also substantially reduce an organisation’s risk, since user requests are funnelled through a single ‘front door’, instead of to any number of servers that host the application.




Please login with linkedin to comment

fastly

Latest News

Sydney Comedy Festival: Taking The City & Social Media By Storm
  • Media

Sydney Comedy Festival: Taking The City & Social Media By Storm

Sydney Comedy Festival 2024 is live and ready to rumble, showing the best of international and homegrown talent at a host of venues around town. As usual, it’s hot on the heels of its big sister, the giant that is the Melbourne International Comedy Festival, picking up some acts as they continue on their own […]

Global Marketers Descend For AANA’s RESET For Growth
  • Advertising

Global Marketers Descend For AANA’s RESET For Growth

The Australian Association of National Advertisers (AANA) has announced the final epic lineup of local and global marketing powerhouses for RESET for Growth 2024. Lead image: Josh Faulks, chief executive officer, AANA  Back in 2000, a woman with no business experience opened her first juice bar in Adelaide. The idea was brilliantly simple: make healthy […]